5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Certification     CompTIA     CompTIA A+     CompTIA A+ 220-1102
Among the newer forms of security for most workers in the 21st century involves social engineering -protecting workers and work against subtle but dangerous attacks by con men and scammers.
Take a deep dive into security fundamentals and the many ways in which devious people steal information. This can include masquerading as delivery men, entering unauthorized areas without badges, shoulder surfing at airports or coffee shops, spoofing, dumpster-diving, and insidiously clever spear phishing attacks.
Explore how legitimate-looking e-mails can lure workers to malicious websites, or worse, into opening encrypted attachments with company credentials or passwords. Lastly, discover common security vulnerabilities including non-compliant, unpatched, and unprotected systems, end of life (EOL) operating systems, and bring your own devices (BYOD).
This course will prepare you for the CompTIA A+ Core 2 (220-1102) certification exam.

Objectives

CompTIA A+ (220-1102): Social Engineering Attacks

  • discover the key concepts covered in this course
  • differentiate between phishing and vishing social engineering attacks
  • outline the risks associated with shoulder surfing
  • provide an overview of whaling phishing attacks
  • recognize the signs of a tailgating attack
  • describe how an impersonating attack is carried out
  • illustrate how items that have been disposed of can be used to retrieve information to gain access to a computer
  • recognize evil twin attacks and how to prevent them
  • recognize the signs of denial of service (DoS) and DDoS attacks
  • provide an overview of zero-day attacks
  • recognize the signs of a spoofing (masquerading) threat
  • provide an overview of on-path attacks
  • describe how brute force and dictionary attacks can be used to gain access to a system
  • identify the risks associated with insider threats
  • describe SQL injection attacks
  • recognize the signs of an XSS attack
  • list common security vulnerabilities
  • summarize the key concepts covered in this course